首页 | 本学科首页   官方微博 | 高级检索  
     

应对多种威胁的安全计算机终端
引用本文:张学军,李予温.应对多种威胁的安全计算机终端[J].信息网络安全,2014(9):171-175.
作者姓名:张学军  李予温
作者单位:中晟国计科技有限公司,北京100011
摘    要:计算机是信息系统的重要组成部分,它面临来自外部和内部的信息安全威胁。目前计算机终端上的防护方式主要针对来自网络和外部的病毒、木马和攻击等安全威胁,对于内部人员的疏忽和蓄意造成的泄密基本无能为力。此外,由于防护功能建立在待保护的计算机上,其本身可靠性受现有计算机硬件与操作系统的各种缺陷和漏洞的制约。文章提出了一种具备独立防护系统的安全计算机架构,理论分析和实践表明,该架构能够有效应对外部和内部的安全威胁,保护计算机本身及内部数据信息的安全。

关 键 词:计算机  防护系统  双主机  可信计算

A Secure Computer Terminal Coping with Various Threats
ZHANG Xue-jun,LI Yu-wen.A Secure Computer Terminal Coping with Various Threats[J].Netinfo Security,2014(9):171-175.
Authors:ZHANG Xue-jun  LI Yu-wen
Affiliation:(China Security Operations Computer Ltd., Beijing 100011,China)
Abstract:As an important part of the information system, computer faces security threats from external and internal. The current way of protection, mainly against viruses, Trojans and other security threats and attacks from the network and external, has little effect on negligence and deliberate leaks from behavior of internal staff. Furthermore, the protection function is based on the computer to be protected, its own reliability is limited. This article proposes secure computer architecture with independent protection system, theoretical analysis and practice show that this architecture can effectively respond to external and internal security threats, protect the security of the computer itself and internal data information.
Keywords:computer  protection system  dual host  trusted computing
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号